|By Adrian Bridgwater||
|February 1, 2013 11:00 AM EST||
As we know, Chief Information Officers are generally ‘change and upheaval averse' because it is, after all, mostly prudent to resist change. With change comes risk, new user training, new integration challenges and a bottom line with increased cost. But new social enterprise trends cannot be brought to bear without taking the necessary steps that form Business Process re-Engineering (BPE) and its associated evils.
If process re-engineering within the commercial space has indeed developed a bad name, this may be down to the fluffier of the fluffy management consultants who operate in this space. The serious, non-fluffy and very real process of moving to new social enterprise platforms is now a very pressing challenge for many CIOs (and CEOs) who realize that they must adapt to the new way of working practices if they are to optimize efficiency.
What Is Social Enterprise Software Anyway?
The kind of social business tools we are focusing on in this new zone of work practice include:
- Blogs and microblogs
- Wikis, knowledge banks and databases
- Workflow activity tracking tools
- Forums for community discussion
- Tagging and bookmarking tools
- Content recommendation and also people recommendation engines
Stuart McRae is executive collaboration evangelist at IBM, so that basically makes him a social enterprise software tool missionary devoted to explaining why this new obligation to change working practices is so important. The move to social enterprise tools is a bit like the email adoption boom of the early '90s he says. "Comments like ‘we'll never use email' gave way to conversations where CEOs asked their CIOs ‘why do all of my peers have an email address on their business card, but I don't?' - the concept of leveraging social media and networking for internal and external conversations is clearly Crossing the Chasm (in Geoffrey Moore's words), even if it is not yet mainstream."
Dominant Social Manifestations
McRae argues that the cultural, behavioral and organizational changes that will be the dominant manifestations of social business are only just now starting to appear.
We can look back at the last decade of the previous century and see that a massive change in our work methods brought about by the arrival of email was just one of a number of coincidental developments that drove new organizational models in every business vertical.
"[Email] combined with wide area networks, laptops, mobile phones, videoconferencing, mass air transportation and acceptance of English as a common language for business turned work into something you did from anywhere, not somewhere you went. [There has also been a] shift to services industries as the engine of growth and to globalization as the dominant organizational trend in business," said IBM's McRae.
He further argues that today, social media (and ultimately new social enterprise practices) are integrating with the proliferating use of mobile devices, cloud computing, analytics on Big Data and more besides. These factors will now coalesce and be amplified by (in all probability suggests McRae) a congruent set of "non-IT" trends like the emergence of major new world super-economies and mega-cities, low-cost airlines and high speed trains, rural broadband and true "always on" networks.
McRae's Seven Pillars of Social Enterprise Wisdom
For Stuart McRae there are seven pivotal stages, factors and facets of making social enterprise a success and these points may indeed form a checklist that CIOs should now be aiming to target.
#1 - Social enterprise is not a pilot. This is not a rehearsal and firms should realize that the progression to adopt these new tools is an imperative.
#2 - Senior stakeholders (and of course by that we generally mean employees) within the organization need to buy in to the social enterprise mindset and lead by example. It is not an "option" to use social enterprise tools; it is part of the job.
#3 - Closely linked to point #2 is the stipulation that social enterprise tools must be embedded at the heart of work for every user, i.e., social is not something you do as well as work, social is something you do as part of the way you work at the core.
#4 - We need social enterprise to flourish in an environment where there are no silos of excluded individuals so it must be open to all. The only caveat here is that grouped control of certain discussions where a need for confidentiality arises can still be managed. Everyone from the receptionist (or this may be the CEO's personal executive assistant) to the sales director has to get involved.
#5 - There must be integration with the way people work today, i.e., plug ins for Internet Explorer and Microsoft Word, to allow users to blog or integrate with social channels right from the application that they are already used to using. McRae notes that this is core to IBM's product portfolio in this space.
#6 - The firm must continually monitor and look for obstacles that might impede or slow down social enterprise adoption and eradicate and remove these hindrances when they are identified.
#7 - A social firm will need to create and build communities of champions that record their success and barriers as they carry out their own idea generation. Ideas need to pass through a process of (i) suggestion (ii) discussion (iii) voting and (iv) graduation.
Note: It's important to remember that outgoing and gregarious sales directors are often excellent external communicators, but very poor when it comes to their internal messaging. For this reason, the receptionist may win over the sales director in terms of social enterprise champion.
How Do We Get Truly Social?
"In many organizations, successful use of social tools is happening today when small groups of employees with a common pain point figure out how to address them by finding a suitable social platform and focusing on their problem, not the tool. While the choice of a poor tool will prevent success, you will not hear about those projects - just the ones that succeed - and there the selected tool only needs to be ‘good enough' for the specific problem in hand," said McRae.
Social business practices and the wider development of social enterprise platforms and tools by major IT vendors from IBM but also Box, Cisco Systems, Citrix Online, Google, Microsoft, salesforce.com and Yammer are already having a major impact upon the way we work. We, the users, are driving these trends through our own preferences for using tools such as Twitter and Facebook in the mainstream outside of the workplace.
There will be a need to agree upon and implement acceptable levels of net-based etiquette to corral and control our use of social enterprise tools. But as IBM's McRae insists upon asking, "Isn't all etiquette social anyway?" It can't be that hard to be social, can it?
This post first appeared on CIO Enterprise Forum here.
The definition of IoT is not new, in fact it’s been around for over a decade. What has changed is the public's awareness that the technology we use on a daily basis has caught up on the vision of an always on, always connected world. If you look into the details of what comprises the IoT, you’ll see that it includes everything from cloud computing, Big Data analytics, “Things,” Web communication, applications, network, storage, etc. It is essentially including everything connected online from ha...
Nov. 22, 2014 10:00 PM EST Reads: 953
We are all here because we are sold on the transformative promise of The Cloud. But what good is all of this ephemeral, on-demand infrastructure if your usage doesn't actually improve the agility and speed of your business? How must Operations adapt in order to avoid stifling your Cloud initiative? In his session at DevOps Summit, Damon Edwards, co-founder and managing partner of the DTO Solutions, will highlight the successful organizational, process, and tooling patterns of high-performing c...
Nov. 22, 2014 08:45 PM EST Reads: 879
Software-driven innovation is becoming a primary approach to how businesses create and deliver new value to customers. A survey of 400 business and IT executives by the IBM Institute for Business Value showed businesses that are more effective at software delivery are also more profitable than their peers nearly 70 percent of the time (1). DevOps provides a way for businesses to remain competitive, applying lean and agile principles to software development to speed the delivery of software that ...
Nov. 22, 2014 08:00 PM EST Reads: 1,408
Docker offers a new, lightweight approach to application portability. Applications are shipped using a common container format and managed with a high-level API. Their processes run within isolated namespaces that abstract the operating environment independently of the distribution, versions, network setup, and other details of this environment. This "containerization" has often been nicknamed "the new virtualization." But containers are more than lightweight virtual machines. Beyond their small...
Nov. 22, 2014 06:45 PM EST Reads: 1,090
The move in recent years to cloud computing services and architectures has added significant pace to the application development and deployment environment. When enterprise IT can spin up large computing instances in just minutes, developers can also design and deploy in small time frames that were unimaginable a few years ago. The consequent move toward lean, agile, and fast development leads to the need for the development and operations sides to work very closely together. Thus, DevOps become...
Nov. 22, 2014 05:45 PM EST Reads: 1,171
Cloud Expo 2014 TV commercials will feature @ThingsExpo, which was launched in June, 2014 at New York City's Javits Center as the largest 'Internet of Things' event in the world.
Nov. 22, 2014 05:30 PM EST Reads: 1,242
An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, New York's at the Javits Center, Davi Ottenheimer, EMC Senior Director of Trust, reviewed hands-on lessons with IoT devices and reveal a new risk balance you might not expect. Davi Ottenheimer, EMC Senior Director of Trust, has more than nineteen years' experience managing global security operations and asse...
Nov. 22, 2014 05:30 PM EST Reads: 1,023
The major cloud platforms defy a simple, side-by-side analysis. Each of the major IaaS public-cloud platforms offers their own unique strengths and functionality. Options for on-site private cloud are diverse as well, and must be designed and deployed while taking existing legacy architecture and infrastructure into account. Then the reality is that most enterprises are embarking on a hybrid cloud strategy and programs. In this Power Panel at 15th Cloud Expo (http://www.CloudComputingExpo.com...
Nov. 22, 2014 07:00 AM EST Reads: 1,323
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at Internet of @ThingsExpo, James Kirkland, Chief Ar...
Nov. 21, 2014 09:15 PM EST Reads: 1,243
Leysin American School is an exclusive, private boarding school located in Leysin, Switzerland. Leysin selected an OpenStack-powered, private cloud as a service to manage multiple applications and provide development environments for students across the institution. Seeking to meet rigid data sovereignty and data integrity requirements while offering flexible, on-demand cloud resources to users, Leysin identified OpenStack as the clear choice to round out the school's cloud strategy. Additional...
Nov. 21, 2014 08:45 PM EST Reads: 1,208
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, a...
Nov. 21, 2014 08:00 PM EST Reads: 1,259
Technology is enabling a new approach to collecting and using data. This approach, commonly referred to as the "Internet of Things" (IoT), enables businesses to use real-time data from all sorts of things including machines, devices and sensors to make better decisions, improve customer service, and lower the risk in the creation of new revenue opportunities. In his General Session at Internet of @ThingsExpo, Dave Wagstaff, Vice President and Chief Architect at BSQUARE Corporation, discuss the ...
Nov. 21, 2014 08:00 PM EST Reads: 1,322
"BSQUARE is in the business of selling software solutions for smart connected devices. It's obvious that IoT has moved from being a technology to being a fundamental part of business, and in the last 18 months people have said let's figure out how to do it and let's put some focus on it, " explained Dave Wagstaff, VP & Chief Architect, at BSQUARE Corporation, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Nov. 21, 2014 07:00 PM EST Reads: 1,198
The 4th International DevOps Summit, co-located with16th International Cloud Expo – being held June 9-11, 2015, at the Javits Center in New York City, NY – announces that its Call for Papers is now open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's large...
Nov. 21, 2014 06:45 PM EST Reads: 1,163
Verizon Enterprise Solutions is simplifying the cloud-purchasing experience for its clients, with the launch of Verizon Cloud Marketplace, a key foundational component of the company's robust ecosystem of enterprise-class technologies. The online storefront will initially feature pre-built cloud-based services from AppDynamics, Hitachi Data Systems, Juniper Networks, PfSense and Tervela. Available globally to enterprises using Verizon Cloud, Verizon Cloud Marketplace provides a one-stop shop fo...
Nov. 21, 2014 05:30 PM EST Reads: 1,131
"Our premise is Docker is not enough. That's not a bad thing - we actually love Docker. At ActiveState all our products are based on open source technology and Docker is an up-and-coming piece of open source technology," explained Bart Copeland, President & CEO of ActiveState Software, in this SYS-CON.tv interview at DevOps Summit at Cloud Expo®, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Nov. 20, 2014 10:30 PM EST Reads: 1,269
DevOps Summit 2015 New York, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete...
Nov. 20, 2014 09:00 PM EST Reads: 1,459
Infor has announced a new feature Infor CloudSuite™ Aerospace & Defense (A&D) to aid compliance with International Traffic in Arms Regulations (ITAR). The ITAR function will serve as a complementary function for new or existing Infor CloudSuite A&D customers, to facilitate compliance for Infor customers that are creating a US defense article or performing a US defense service and wish to benefit from cloud-services. The ITAR regulation serves to manage handling and access requirements for dat...
Nov. 20, 2014 07:00 PM EST Reads: 1,279
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, the damage is already done and the network is already compromised. Intellectual property is easily slipped out the back door leaving no trace of forced entry. If we want to reign in on these cybercriminals, it's hig...
Nov. 20, 2014 07:00 PM EST Reads: 1,155